Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 9a1be29

Browse files
committed
updated test cases for regression test
1 parent dfa9076 commit 9a1be29

1 file changed

Lines changed: 25 additions & 27 deletions

File tree

xml/livetests.xml

Lines changed: 25 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -288,13 +288,13 @@
288288
<getColumns value="True"/>
289289
<getCount value="True"/>
290290
<dumpTable value="True"/>
291-
<db value="testdb"/>
291+
<db value="public"/>
292292
<tbl value="users"/>
293293
<excludeSysDbs value="True"/>
294294
</switches>
295295
<parse>
296296
<item value="Title: AND boolean-based blind - WHERE or HAVING clause"/>
297-
<item value="r'back-end DBMS: active fingerprint: PostgreSQL &gt;= 8.4.0 and &lt; 9.0.0'"/>
297+
<item value="r'back-end DBMS: active fingerprint: PostgreSQL &gt;= 9.1.0'"/>
298298
<item value="banner: 'PostgreSQL 9.1.11 on i686-pc-linux-gnu, compiled by gcc (Debian 4.7.2-5) 4.7.2, 32-bit'"/>
299299
<item value="current user: 'postgres'"/>
300300
<item value="current schema (equivalent to database on PostgreSQL): 'public'"/>
@@ -330,14 +330,14 @@
330330
<getColumns value="True"/>
331331
<getCount value="True"/>
332332
<dumpTable value="True"/>
333-
<db value="testdb"/>
333+
<db value="public"/>
334334
<tbl value="users"/>
335335
<excludeSysDbs value="True"/>
336336
<answers value="do you want to perform a dictionary-based attack against retrieved password hashes=N"/>
337337
</switches>
338338
<parse>
339339
<item value="Title: PostgreSQL AND error-based - WHERE or HAVING clause"/>
340-
<item value="r'back-end DBMS: active fingerprint: PostgreSQL &gt;= 8.4.0 and &lt; 9.0.0'"/>
340+
<item value="r'back-end DBMS: active fingerprint: PostgreSQL &gt;= 9.1.0'"/>
341341
<item value="banner: 'PostgreSQL 9.1.11 on i686-pc-linux-gnu, compiled by gcc (Debian 4.7.2-5) 4.7.2, 32-bit'"/>
342342
<item value="current user: 'postgres'"/>
343343
<item value="current schema (equivalent to database on PostgreSQL): 'public'"/>
@@ -373,14 +373,14 @@
373373
<getColumns value="True"/>
374374
<getCount value="True"/>
375375
<dumpTable value="True"/>
376-
<db value="testdb"/>
376+
<db value="public"/>
377377
<tbl value="users"/>
378378
<excludeSysDbs value="True"/>
379379
<answers value="do you want to perform a dictionary-based attack against retrieved password hashes=N"/>
380380
</switches>
381381
<parse>
382382
<item value="Title: Generic UNION query (NULL) - 3 columns"/>
383-
<item value="r'back-end DBMS: active fingerprint: PostgreSQL &gt;= 8.4.0 and &lt; 9.0.0'"/>
383+
<item value="r'back-end DBMS: active fingerprint: PostgreSQL &gt;= 9.1.0'"/>
384384
<item value="banner: 'PostgreSQL 9.1.11 on i686-pc-linux-gnu, compiled by gcc (Debian 4.7.2-5) 4.7.2, 32-bit'"/>
385385
<item value="current user: 'postgres'"/>
386386
<item value="current schema (equivalent to database on PostgreSQL): 'public'"/>
@@ -416,14 +416,14 @@
416416
<getColumns value="True"/>
417417
<getCount value="True"/>
418418
<dumpTable value="True"/>
419-
<db value="testdb"/>
419+
<db value="public"/>
420420
<tbl value="users"/>
421421
<excludeSysDbs value="True"/>
422422
<answers value="do you want to perform a dictionary-based attack against retrieved password hashes=N"/>
423423
</switches>
424424
<parse>
425425
<item value="Title: Generic UNION query (NULL) - 3 columns"/>
426-
<item value="r'back-end DBMS: active fingerprint: PostgreSQL &gt;= 8.4.0 and &lt; 9.0.0'"/>
426+
<item value="r'back-end DBMS: active fingerprint: PostgreSQL &gt;= 9.1.0'"/>
427427
<item value="banner: 'PostgreSQL 9.1.11 on i686-pc-linux-gnu, compiled by gcc (Debian 4.7.2-5) 4.7.2, 32-bit'"/>
428428
<item value="current user: 'postgres'"/>
429429
<item value="current schema (equivalent to database on PostgreSQL): 'public'"/>
@@ -487,14 +487,14 @@
487487
<getColumns value="True"/>
488488
<getCount value="True"/>
489489
<dumpTable value="True"/>
490-
<db value="testdb"/>
490+
<db value="public"/>
491491
<tbl value="users"/>
492492
<excludeSysDbs value="True"/>
493493
<answers value="do you want to perform a dictionary-based attack against retrieved password hashes=N"/>
494494
</switches>
495495
<parse>
496496
<item value="Title: PostgreSQL inline queries"/>
497-
<item value="r'back-end DBMS: active fingerprint: PostgreSQL &gt;= 8.4.0 and &lt; 9.0.0'"/>
497+
<item value="r'back-end DBMS: active fingerprint: PostgreSQL &gt;= 9.1.0'"/>
498498
<item value="banner: 'PostgreSQL 9.1.11 on i686-pc-linux-gnu, compiled by gcc (Debian 4.7.2-5) 4.7.2, 32-bit'"/>
499499
<item value="current user: 'postgres'"/>
500500
<item value="current schema (equivalent to database on PostgreSQL): 'public'"/>
@@ -905,7 +905,7 @@
905905
<parse>
906906
<item value="Title: AND boolean-based blind - WHERE or HAVING clause"/>
907907
<item value="r'back-end DBMS: active fingerprint: SQLite 3'"/>
908-
<item value="banner: '3.7.3'"/>
908+
<item value="banner: '3.7.13'"/>
909909
<item value="r'Database: SQLite_masterdb.+1 table.+users'"/>
910910
<item value="r'Database: SQLite_masterdb.+Table: users.+3 columns.+surname.+TEXT'"/>
911911
<item value="r'Database: SQLite_masterdb.+Table: users.+5 entries.+luther.+nameisnull.+'"/>
@@ -938,7 +938,7 @@
938938
<parse>
939939
<item value="Title: Generic UNION query (NULL) - 3 columns"/>
940940
<item value="r'back-end DBMS: active fingerprint: SQLite 3'"/>
941-
<item value="banner: '3.7.3'"/>
941+
<item value="banner: '3.7.13'"/>
942942
<item value="r'Database: SQLite_masterdb.+1 table.+users'"/>
943943
<item value="r'Database: SQLite_masterdb.+Table: users.+3 columns.+surname.+TEXT'"/>
944944
<item value="r'Database: SQLite_masterdb.+Table: users.+5 entries.+luther.+user agent.+'"/>
@@ -970,7 +970,7 @@
970970
<parse>
971971
<item value="Title: Generic UNION query (NULL) - 3 columns"/>
972972
<item value="r'back-end DBMS: active fingerprint: SQLite 3'"/>
973-
<item value="banner: '3.7.3'"/>
973+
<item value="banner: '3.7.13'"/>
974974
<item value="r'Database: SQLite_masterdb.+1 table.+users'"/>
975975
<item value="r'Database: SQLite_masterdb.+Table: users.+3 columns.+surname.+TEXT'"/>
976976
<item value="r'Database: SQLite_masterdb.+Table: users.+5 entries.+luther.+user agent.+'"/>
@@ -988,7 +988,7 @@
988988
<parse>
989989
<item value="Title: SQLite &gt; 2.0 AND time-based blind (heavy query)"/>
990990
<item value="r'back-end DBMS: active fingerprint: SQLite 3'"/>
991-
<item value="banner: '3.7.3'"/>
991+
<item value="banner: '3.7.13'"/>
992992
</parse>
993993
</case>
994994
<case name="SQLite inline queries multi-threaded enumeration - all entries">
@@ -1049,7 +1049,7 @@
10491049
<parse>
10501050
<item value="Title: AND boolean-based blind - WHERE or HAVING clause"/>
10511051
<item value="r'back-end DBMS: active fingerprint: Firebird 2.1 \(dialect 3\)'"/>
1052-
<item value="banner: '2.5.0'"/>
1052+
<item value="banner: '2.5.2'"/>
10531053
<item value="current user: 'SYSDBA'"/>
10541054
<item value="r'current database: '/'"/>
10551055
<item value="current user is DBA: True"/>
@@ -1088,7 +1088,7 @@
10881088
<parse>
10891089
<item value="Title: AND boolean-based blind - WHERE or HAVING clause"/>
10901090
<item value="r'back-end DBMS: active fingerprint: Firebird 2.1 \(dialect 3\)'"/>
1091-
<item value="banner: '2.5.0'"/>
1091+
<item value="banner: '2.5.2'"/>
10921092
<item value="current user: 'SYSDBA'"/>
10931093
<item value="r'current database: '/'"/>
10941094
<item value="current user is DBA: True"/>
@@ -1127,7 +1127,7 @@
11271127
<parse>
11281128
<item value="Title: Generic UNION query (NULL) - 3 columns"/>
11291129
<item value="r'back-end DBMS: active fingerprint: Firebird 2.1 \(dialect 3\)'"/>
1130-
<item value="banner: '2.5.0'"/>
1130+
<item value="banner: '2.5.2'"/>
11311131
<item value="current user: 'SYSDBA'"/>
11321132
<item value="r'current database: '/'"/>
11331133
<item value="current user is DBA: True"/>
@@ -1166,7 +1166,7 @@
11661166
<parse>
11671167
<item value="Title: Generic UNION query (NULL) - 3 columns"/>
11681168
<item value="r'back-end DBMS: active fingerprint: Firebird 2.1 \(dialect 3\)'"/>
1169-
<item value="banner: '2.5.0'"/>
1169+
<item value="banner: '2.5.2'"/>
11701170
<item value="current user: 'SYSDBA'"/>
11711171
<item value="r'current database: '/'"/>
11721172
<item value="current user is DBA: True"/>
@@ -1191,7 +1191,7 @@
11911191
</switches>
11921192
<parse>
11931193
<item value="Title: Firebird AND time-based blind (heavy query)"/>
1194-
<item value="banner: '2.5.0'"/>
1194+
<item value="banner: '2.5.2'"/>
11951195
<item value="current user is DBA: True"/>
11961196
</parse>
11971197
</case>
@@ -1221,7 +1221,7 @@
12211221
<parse>
12221222
<item value="Title: Firebird inline queries"/>
12231223
<item value="r'back-end DBMS: active fingerprint: Firebird 2.1 \(dialect 3\)'"/>
1224-
<item value="banner: '2.5.0'"/>
1224+
<item value="banner: '2.5.2'"/>
12251225
<item value="current user: 'SYSDBA'"/>
12261226
<item value="r'current database: '/'"/>
12271227
<item value="current user is DBA: True"/>
@@ -1296,7 +1296,7 @@
12961296
<tech value="E"/>
12971297
<getSchema value="True"/>
12981298
<dumpTable value="True"/>
1299-
<db value="testdb"/>
1299+
<db value="public"/>
13001300
<tbl value="users"/>
13011301
<limitStart value="2"/>
13021302
<limitStop value="4"/>
@@ -1314,7 +1314,7 @@
13141314
<tech value="U"/>
13151315
<getSchema value="True"/>
13161316
<dumpTable value="True"/>
1317-
<db value="testdb"/>
1317+
<db value="public"/>
13181318
<tbl value="users"/>
13191319
<limitStart value="2"/>
13201320
<limitStop value="4"/>
@@ -1331,7 +1331,7 @@
13311331
<threads value="4"/>
13321332
<tech value="B"/>
13331333
<dumpTable value="True"/>
1334-
<db value="testdb"/>
1334+
<db value="public"/>
13351335
<tbl value="users"/>
13361336
<firstChar value="3"/>
13371337
<lastChar value="5"/>
@@ -3216,13 +3216,12 @@
32163216
<!-- End of file system access switches -->
32173217

32183218
<!-- Operating system access switches -->
3219-
<!--
32203219
<case name="MySQL web shell - command execution">
32213220
<switches>
32223221
<url value="http://debian/sqlmap/mysql/get_int.php?id=1"/>
32233222
<tech value="B"/>
32243223
<osCmd value="id"/>
3225-
<answers value="please provide additional comma separated file paths to=test"/>
3224+
<answers value="what do you want to use for writable directory=2,please provide a comma separate list of absolute directory paths=/var/www/test"/>
32263225
</switches>
32273226
<parse>
32283227
<item value="command standard output: 'uid="/>
@@ -3234,13 +3233,12 @@
32343233
<tech value="BU"/>
32353234
<osPwn value="True"/>
32363235
<msfPath value="/usr/local/bin/"/>
3237-
<answers value="please provide additional comma separated file paths to=/var/www/test,do you want to overwrite it=Y,which connection type do you want to use=2"/>
3236+
<answers value="what do you want to use for writable directory=2,please provide a comma separate list of absolute directory paths=/var/www/test"/>
32383237
</switches>
32393238
<parse>
32403239
<item value="r'Sending stage.+Linux.+uid=.+www-data'" console_output="True"/>
32413240
</parse>
32423241
</case>
3243-
-->
32443242
<case name="PostgreSQL User-Defined Function (UDF) injection - command execution (UNION)">
32453243
<switches>
32463244
<url value="http://debian/sqlmap/pgsql/get_int.php?id=1"/>

0 commit comments

Comments
 (0)